1.5 KiB
1.5 KiB
Docker Infrastructure Security Audit Findings
Applies when: reviewing Docker configurations, adding new services to docker-compose, creating production deployment configs, or auditing container security.
Critical Issues (as of 2026-03-24)
cofee_backend/.envis tracked in git (committed in0299949)..gitignorehas no.enventry.cofee_frontend/.envis tracked in git (committed in71b9749)..gitignoreonly excludes.env*.local, not.env.cofee_backend/.dockerignoredoes NOT exclude.env— secrets enter Docker build context.remotion_service/.gitignoreand.dockerignorecorrectly exclude.env.
High Issues
- Both Dockerfiles (backend + remotion) run as root — no
USERdirective, noadduser. docker-compose.ymlhas hardcoded defaults:JWT_SECRET_KEY=dev-secret,postgres/postgres,minioadmin/minioadmin.- Redis has no authentication (
--requirepassnot set), exposed on host port 6379. - All ports bound to
0.0.0.0(shorthand format), not127.0.0.1.
Medium Issues
- No network segmentation — all backend services on default bridge network.
- No container resource limits (mem_limit, cpus).
- No capability dropping (cap_drop: ALL).
- MinIO image unpinned (
minio/minio= latest). Other images pinned by tag, not digest. - Remotion compose mounts entire project dir (
.:/app:cached), bypassing .dockerignore at runtime. - Chromium sandbox disabled (
REMOTION_PUPPETEER_NO_SANDBOX=1) + running as root.
Remediation Status
- All findings reported, none remediated yet as of this audit date.